☆13Mar 31, 2023Updated 2 years ago
Alternatives and similar repositories for tfstate2IAM
Users that are interested in tfstate2IAM are comparing it to the libraries listed below
Sorting:
- ☆24Mar 20, 2023Updated 2 years ago
- ☆98Jul 23, 2025Updated 7 months ago
- ☆20Feb 9, 2024Updated 2 years ago
- ☆142Feb 26, 2026Updated last week
- ☆14Jul 21, 2024Updated last year
- This example demonstrates a pattern to leverage multiple identity providers with an API Gateway and manage Authorization with Amazon Veri…☆18Jan 22, 2024Updated 2 years ago
- Unofficial list of approved tools for OSCP☆27Apr 25, 2023Updated 2 years ago
- ☆24Nov 3, 2022Updated 3 years ago
- Privilege escalation in Docker☆31Jun 30, 2022Updated 3 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Aug 28, 2023Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Deploy Kubernetes Helm Charts for Check Point CloudGuard☆19Oct 21, 2025Updated 4 months ago
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated 11 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- ☆11May 1, 2024Updated last year
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 8 months ago
- ☆13Nov 5, 2024Updated last year
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- An optimization algorithm for the design of pneumatic soft robots.☆14Jul 30, 2025Updated 7 months ago
- An attempt to live code a working Retrieval Augmented Generation app with AI coding tools☆17Apr 24, 2025Updated 10 months ago
- ☆29Feb 28, 2026Updated last week
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆31Jan 27, 2026Updated last month
- ☆12Jun 17, 2024Updated last year
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- ☆13Jun 10, 2024Updated last year
- Particles (or stars) flowing smoothly in a Perlin Noise field. Very customizable.☆10Nov 24, 2025Updated 3 months ago
- ☆11Jan 3, 2023Updated 3 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Virtual service to help secure IoT devices☆12Aug 17, 2017Updated 8 years ago
- Provides a simple Rest enpoint to create PlantUml images☆10Aug 5, 2016Updated 9 years ago
- ☆17Nov 30, 2025Updated 3 months ago